Jordan peeked into Stephanie's office, and felt relief when he saw that she was in, sitting as usual with her feet up on her desk, talking into her headset. She waved him in and pointed to a chair. He sat.
As he waited, Stephanie smiled at him, then rolled her eyes as she wagged her head back and forth, indicating with her usual good humor that the person at the other end of the phone was droning on, and that she had to wait for it to end. Mercifully, it ended after only a minute, and she clicked off. Pulling off her headset, she punched "Do Not Disturb" on the phone. Jordan got up, closed the door, and sat down again. It was becoming their routine.
Stephanie took a pull from the water bottle next to the phone. "OK, spill."
Jordan began, "Joseph lied to Emmons about who did the estimates, and now every time Emmons asks Joseph a question, he tells him 'I'll get back to you,' and then he asks me. I'm sick of this. More than sick."
"What happened now?" Stephanie asked.
is the trademark of
the unsophisticated operator"Just now I find out that Joseph misunderstood Emmons' problem with Marigold's budget, so my latest version wasn't what Emmons wanted. Now Joseph is blaming me."
Jordan is entangled in the consequences of a tactic I call Credit Appropriation. In Credit Appropriation, the appropriator (in this instance, Joseph) takes credit for the work of the target (Jordan), who's usually a subordinate or someone who is or feels vulnerable.
Since credit appropriation is the most obvious, least effective, and perhaps the most common of all political maneuvers, it's the trademark of the unsophisticated operator. Still, it hurts. Here are some tips to keep in mind if an Appropriator targets you.
- Be aware
- Even if you haven't yet been targeted, the Appropriator will likely get around to you, eventually. Notice patterns of appropriation, not only from your peers, but from the Appropriator's peers, too. Awareness is preparedness.
- Watch for blowback
- What can be taken can be returned. If the "credit" turns negative, the appropriator is likely to blame you. Resist making modifications or doing any follow-ons to the appropriated work, since these activities can lead to trouble. This is what happened to Jordan.
- Complexity is your friend
- Seed your work with complexities and nuance that you alone understand. Eventually, the complexity will compel the Appropriator to reveal the work's true author. If the complexity is evident enough, it might even deter appropriation altogether.
Credit Appropriation is the first item in my catalog of Devious Political Tactics — more are coming. Have you found yourself in this situation? Or others? Tell me your story. Making these tactics public — and giving them names — is perhaps the best way to prevent their use. Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenHzeUBKIMjYYfpiPnner@ChacucSFarndxZlbsnDnoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- Nasty Questions: I
- Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather,
they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's
political agenda. Here's part one a catalog of some favorite tactics.
- Projection Errors at Work
- Often, at work, we make interpretations of the behavior of others. Sometimes we base these interpretations
not on actual facts, but on our perceptions of facts. And our perceptions are sometimes erroneous.
- Projects as Proxy Targets: I
- Some projects have detractors so determined to prevent project success that there's very little they
won't do to create conditions for failure. Here's Part I of a catalog of tactics they use.
- On Snitching at Work: I
- Some people have difficulty determining the propriety of reporting violations to authorities at work.
Proper or not, reporting violations can be simultaneously both risky and necessary.
- The Opposite of Influence
- The question of why some people are so influential has a partner question: why are others largely ignored,
or opposed, even when their contributions are valuable?
Forthcoming issues of Point Lookout
- Coming May 2: Narcissistic Behavior at Work: VII
- Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
- And on May 9: Unethical Coordination
- When an internal department or an external source is charged with managing information about a large project, a conflict of interest can develop. That conflict presents opportunities for unethical behavior. What is the nature of that conflict, and what ethical breaches can occur? Available here and by RSS on May 9.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenBcKPCSqaBPMoYHWaner@ChacawfXzMXGAZOXSzMroCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.